rsakey-builtin.c.inc 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200
  1. /*
  2. * QEMU Crypto akcipher algorithms
  3. *
  4. * Copyright (c) 2022 Bytedance
  5. * Author: lei he <helei.sig11@bytedance.com>
  6. *
  7. * This library is free software; you can redistribute it and/or
  8. * modify it under the terms of the GNU Lesser General Public
  9. * License as published by the Free Software Foundation; either
  10. * version 2.1 of the License, or (at your option) any later version.
  11. *
  12. * This library is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  15. * Lesser General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU Lesser General Public
  18. * License along with this library; if not, see <http://www.gnu.org/licenses/>.
  19. *
  20. */
  21. #include "der.h"
  22. #include "rsakey.h"
  23. static int extract_mpi(void *ctx, const uint8_t *value,
  24. size_t vlen, Error **errp)
  25. {
  26. QCryptoAkCipherMPI *mpi = (QCryptoAkCipherMPI *)ctx;
  27. if (vlen == 0) {
  28. error_setg(errp, "Empty mpi field");
  29. return -1;
  30. }
  31. mpi->data = g_memdup2(value, vlen);
  32. mpi->len = vlen;
  33. return 0;
  34. }
  35. static int extract_version(void *ctx, const uint8_t *value,
  36. size_t vlen, Error **errp)
  37. {
  38. uint8_t *version = (uint8_t *)ctx;
  39. if (vlen != 1 || *value > 1) {
  40. error_setg(errp, "Invalid rsakey version");
  41. return -1;
  42. }
  43. *version = *value;
  44. return 0;
  45. }
  46. static int extract_seq_content(void *ctx, const uint8_t *value,
  47. size_t vlen, Error **errp)
  48. {
  49. const uint8_t **content = (const uint8_t **)ctx;
  50. if (vlen == 0) {
  51. error_setg(errp, "Empty sequence");
  52. return -1;
  53. }
  54. *content = value;
  55. return 0;
  56. }
  57. /**
  58. *
  59. * RsaPubKey ::= SEQUENCE {
  60. * n INTEGER
  61. * e INTEGER
  62. * }
  63. */
  64. static QCryptoAkCipherRSAKey *qcrypto_builtin_rsa_public_key_parse(
  65. const uint8_t *key, size_t keylen, Error **errp)
  66. {
  67. QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1);
  68. const uint8_t *seq;
  69. size_t seq_length;
  70. int decode_ret;
  71. decode_ret = qcrypto_der_decode_seq(&key, &keylen,
  72. extract_seq_content, &seq, errp);
  73. if (decode_ret < 0 || keylen != 0) {
  74. goto error;
  75. }
  76. seq_length = decode_ret;
  77. if (qcrypto_der_decode_int(&seq, &seq_length, extract_mpi,
  78. &rsa->n, errp) < 0 ||
  79. qcrypto_der_decode_int(&seq, &seq_length, extract_mpi,
  80. &rsa->e, errp) < 0) {
  81. goto error;
  82. }
  83. if (seq_length != 0) {
  84. goto error;
  85. }
  86. return rsa;
  87. error:
  88. if (errp && !*errp) {
  89. error_setg(errp, "Invalid RSA public key");
  90. }
  91. qcrypto_akcipher_rsakey_free(rsa);
  92. return NULL;
  93. }
  94. /**
  95. * RsaPrivKey ::= SEQUENCE {
  96. * version INTEGER
  97. * n INTEGER
  98. * e INTEGER
  99. * d INTEGER
  100. * p INTEGER
  101. * q INTEGER
  102. * dp INTEGER
  103. * dq INTEGER
  104. * u INTEGER
  105. * otherPrimeInfos OtherPrimeInfos OPTIONAL
  106. * }
  107. */
  108. static QCryptoAkCipherRSAKey *qcrypto_builtin_rsa_private_key_parse(
  109. const uint8_t *key, size_t keylen, Error **errp)
  110. {
  111. QCryptoAkCipherRSAKey *rsa = g_new0(QCryptoAkCipherRSAKey, 1);
  112. uint8_t version;
  113. const uint8_t *seq;
  114. int decode_ret;
  115. size_t seq_length;
  116. decode_ret = qcrypto_der_decode_seq(&key, &keylen, extract_seq_content,
  117. &seq, errp);
  118. if (decode_ret < 0 || keylen != 0) {
  119. goto error;
  120. }
  121. seq_length = decode_ret;
  122. decode_ret = qcrypto_der_decode_int(&seq, &seq_length, extract_version,
  123. &version, errp);
  124. if (qcrypto_der_decode_int(&seq, &seq_length, extract_mpi,
  125. &rsa->n, errp) < 0 ||
  126. qcrypto_der_decode_int(&seq, &seq_length, extract_mpi,
  127. &rsa->e, errp) < 0 ||
  128. qcrypto_der_decode_int(&seq, &seq_length, extract_mpi,
  129. &rsa->d, errp) < 0 ||
  130. qcrypto_der_decode_int(&seq, &seq_length, extract_mpi, &rsa->p,
  131. errp) < 0 ||
  132. qcrypto_der_decode_int(&seq, &seq_length, extract_mpi, &rsa->q,
  133. errp) < 0 ||
  134. qcrypto_der_decode_int(&seq, &seq_length, extract_mpi, &rsa->dp,
  135. errp) < 0 ||
  136. qcrypto_der_decode_int(&seq, &seq_length, extract_mpi, &rsa->dq,
  137. errp) < 0 ||
  138. qcrypto_der_decode_int(&seq, &seq_length, extract_mpi, &rsa->u,
  139. errp) < 0) {
  140. goto error;
  141. }
  142. /**
  143. * According to the standard, otherPrimeInfos must be present for version 1.
  144. * There is no strict verification here, this is to be compatible with
  145. * the unit test of the kernel. TODO: remove this until linux kernel's
  146. * unit-test is fixed.
  147. */
  148. if (version == 1 && seq_length != 0) {
  149. if (qcrypto_der_decode_seq(&seq, &seq_length, NULL, NULL, errp) < 0) {
  150. goto error;
  151. }
  152. if (seq_length != 0) {
  153. goto error;
  154. }
  155. return rsa;
  156. }
  157. if (seq_length != 0) {
  158. goto error;
  159. }
  160. return rsa;
  161. error:
  162. if (errp && !*errp) {
  163. error_setg(errp, "Invalid RSA private key");
  164. }
  165. qcrypto_akcipher_rsakey_free(rsa);
  166. return NULL;
  167. }
  168. QCryptoAkCipherRSAKey *qcrypto_akcipher_rsakey_parse(
  169. QCryptoAkCipherKeyType type, const uint8_t *key,
  170. size_t keylen, Error **errp)
  171. {
  172. switch (type) {
  173. case QCRYPTO_AKCIPHER_KEY_TYPE_PRIVATE:
  174. return qcrypto_builtin_rsa_private_key_parse(key, keylen, errp);
  175. case QCRYPTO_AKCIPHER_KEY_TYPE_PUBLIC:
  176. return qcrypto_builtin_rsa_public_key_parse(key, keylen, errp);
  177. default:
  178. error_setg(errp, "Unknown key type: %d", type);
  179. return NULL;
  180. }
  181. }